Skip to content

Maintenance push#186

Merged
jirhiker merged 109 commits intoproductionfrom
staging
Mar 2, 2026
Merged

Maintenance push#186
jirhiker merged 109 commits intoproductionfrom
staging

Conversation

@jirhiker
Copy link
Member

@jirhiker jirhiker commented Mar 2, 2026

Why

This PR addresses the following problem / context:

  • Use bullet points here

How

Implementation summary - the following was changed / added / removed:

  • Use bullet points here

Notes

Any special considerations, workarounds, or follow-up work to note?

  • Use bullet points here

TylerAdamMartinez and others added 30 commits December 8, 2025 18:15
[BDMS-413] Update search bar for contacts & assets
…-patch

[BDMS-354] Update show group/project page to include a fallback component
…ighting-in-search-results

[NO TICKET] Add highlighting to phone numbers
[NO TICKET] Update generated zod files
…o-Google-Maps

[BDMS-323] Add link to google maps
TylerAdamMartinez and others added 28 commits January 20, 2026 13:23
[BDMS-337] Move the Contacts section on the well details page.
[BDMS-347] Update the map component to display the entire state.
[BDMS-446] Go through OcotilloUI repo in order to make repo public
[BDMS-536] Add app timezone config for formatting UTC timestamps
chore(generated): Update generated files
…th redirect

Return { success: true, redirectTo: '/login' } from login to explicitly
tell Refine to stay on the login page while window.location.assign
handles the external redirect to Authentik.

Co-authored-by: Cursor <cursoragent@cursor.com>
…ion-at-login

[NO TICKET] Refactor Auth Flow: Fix Login Races, Improve Token Validation, and Add Error Handling
chore(generated): Update zod types
[BDMS-382] Add hover text & legend to Core Well Info card chips
[BDMS-536] Update the easting and northing values to follow the standard convention.
Copy link

@chatgpt-codex-connector chatgpt-codex-connector bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

💡 Codex Review

Here are some automated review suggestions for this pull request.

Reviewed commit: ad533950cf

ℹ️ About Codex in GitHub

Your team has set up Codex to review pull requests in this repo. Reviews are triggered when you

  • Open a pull request for review
  • Mark a draft as ready
  • Comment "@codex review".

If Codex has suggestions, it will comment; otherwise it will react with 👍.

Codex can also answer questions or update the PR. Try commenting "@codex address that feedback".

Comment on lines +76 to +77
localStorage.setItem(STORAGE_KEYS.idToken, data.id_token)
localStorage.setItem(STORAGE_KEYS.refreshToken, data.refresh_token)

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

P1 Badge Guard optional refresh fields before writing storage

This refresh path writes data.id_token and data.refresh_token to localStorage unconditionally, but OAuth refresh responses are valid even when those fields are omitted; in that case localStorage.setItem stores the literal string "undefined". Once that happens, permission decoding and subsequent refresh calls operate on invalid token values, which can silently de-authorize users after their first token refresh.

Useful? React with 👍 / 👎.

Comment on lines +162 to +166
if (isJwtExpired(access) && !IS_TESTING_AUTH) {
tokenStore.accessToken = null
tokenStore.idToken = null
tokenStore.refreshToken = null
return { authenticated: false, redirectTo: '/login' }

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

P1 Badge Refresh expired access token before forcing logout

When check sees an expired access token, it immediately clears all tokens and redirects to /login instead of attempting a refresh via the existing refresh-token flow. In practice, users with a still-valid refresh token will be logged out on page load/route change at access-token expiry, causing avoidable session drops.

Useful? React with 👍 / 👎.

@jirhiker jirhiker merged commit 12e1ac5 into production Mar 2, 2026
2 of 4 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants